Network+ Exam 5-8

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

How many bits are used in a network with a subnet of 255.0.0.0? 16 64 8 32

8

What is the term used to identify the first four blocks that normally help to identify a network? Host ID Site prefix VTP Netowrk ID

Site prefix

Which of the following planes is made up of the physical or virtual devices that receive and send network messages on their way to their destinations? The application plane The management plane The infrastructure plane The control plane

The infrastructure plane

Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin? Brown Blue White/orange White/green

White/green Explanation: The federal government requires T568A on all federal contracts for backward-compatibility. Pin 1 in the T568A pinout takes the white and green striped wire.

Which fiber connector contains two strands of fiber in each ferrule? MT-RJ SC ST LC

MT-RJ Explanation: The MT-RJ connector is unique from SC, ST, and LC connectors in that it contains two strands of fiber in a single ferrule; with two strands per ferrule, a single MT-RJ connector provides full-duplex signaling.

Which of the following protocols allows a pool of computers or interfaces to share one or more IP addresses? TRILL TRILL SPB LACP CARP

CARP

Which kind of crosstalk occurs between wire pairs near the source of the signal? TX/RX reverse NEXT Alien FEXT

NEXT -NEXT (near end crosstalk) occurs between wire pairs near the source of a signal. Alien crosstalk occurs between two cables. FEXT (far end crosstalk) is measured at the far end of the cable from the signal source. A TX/RX (transmission/receive) reverse occurs when the TX and RX wires are crossed.

You have been working as a network administrator at Yong Solutions, which is an ISP (Internet service provider). The switches used in the storage network of the ISP essentially use the STP (Spanning Tree Protocol) for detecting link failures. You have been asked to upgrade the STP because repeated reports of network transmissions being bogged down have been received. Which of the following will you use in this scenario? RSTP RSTP TRILL SPB iSCSI

SPB

Which protocol replaced TKIP for WPA2? RC4 WEP CCMP

CCMP Explanation: Whereas TKIP (Temporal Key Integrity Protocol) was meant to be backward-compatible as much as possible, CCMP (Counter Mode with CBC [Cipher Block Chaining] MAC [Message Authentication Code] Protocol) helps ensure data confidentiality with both encryption and packet authentication. WEP (Wired Equivalent Privacy) was an early option for 802.11 encryption. RADIUS (Remote Authentication Dial-In User Service) is an open source authentication and authorization service. RC4 (Rivest Cipher 4) is an insecure encryption cipher that is still widely used.

Which type of switch connects all devices in a rack to the rest of the network? Spine switch ToR switch EoR switch Core switch

ToR switch Explanation: A ToR (top of rack) switch connects all other devices in the rack to the rest of the network. EoR (end of row) switching places several leaf switches in a rack at the end of each row of racks. Core switches are highly efficient multilayer switches that support the network's backbone traffic. Similarly, spine switches organize traffic and network segments using OSI layer 3 technologies.

Which transmission characteristic is never fully achieved? bandwidth bit rate latency throughput

bandwidth - Bandwidth refers to the amount of data you could theoretically transmit during a given period of time but is never fully achieved. Latency describes the brief delay that takes place between the instant when data leaves the source and when it arrives at its destination. Throughput refers to the number of data bits (0s and 1s) that are actually received across a connection each second. Throughput is also called bit rate.

With which network connection type does the VM obtain IP addressing information from its host? NAT mode Isolation mode Bridged mode Managed mode

NAT mode Explanation: In NAT (network address translation) mode, a VM obtains IP addressing information from its host rather than from a server or router on the physical network. Although a bridged vNIC communicates through the host's adapter, it obtains its own IP address, default gateway, and subnet mask from a DHCP server on the physical LAN. Isolation mode is not a network connection type but is related to the way a VM gets access to host resources separately from other guests. Managed mode is not a network connection type.

DMPL is an MNC that wants to establish a one-stop shopping point for consumers. DMPL has contracted you to develop a single card that can be used for loyalty and membership programs as well as for cashless payments. The management at DMPL has specified that the card should not include a power source and should be able to transfer data wirelessly over short distances up to 10 cm. Which of the following technologies will you use? ZigBee NFC ANT+ RFID

NFC Correct. NFC (near-field communication) is a form of RFID and transfers data wirelessly over very short distances. NFC tags require no power source other than the receiving device's power field and can be used for ticketing, cashless payment, shopping loyalty or membership programs, identification, data sharing, and PC logon capabilities.

What do well-chosen subnets accomplish? Routing efficiency is decreased by ensuring IP address spaces are not mathematically related. Problems affect the entire network, making them more difficult to pin down. IP address spaces overlap for easier management. Network documentation is easier to manage.

Network documentation is easier to manage. Explanation: Well-chosen subnets make network documentation easier to manage. You don't want IP address spaces to overlap in a network, and routing is more efficient when IP address spaces are mathematically related at a binary level. Well-designed subnets also make problems easier to locate and resolve.

A client has complained to you about connections being dropped on a regular basis in his office. To fix the issue, you plan on checking the RSSI (received signal strength indicator) level to ensure that the minimum signal strength for basic connectivity is maintained. Which RSSI level will you check to get an indication that the minimum signal strength for basic connectivity is maintained? -30 dBm -80 dBm -50 dBm -70 dBm

-80 dBm Correct. The RSSI level of -80 dBm with a not good rating is the minimum signal strength required for basic connectivity, so one must ensure that there is at least a reading of -80 dBm.

How many bits of a class A IP address are used for host information? 32 bits 16 bits 8 bits 24 bits

24 bits Explanation: In classful addressing, class A networks use 24 bits of a 32-bit IPv4 address to identify the host, and only the first eight bits are used to identify the network.

Analyze which of the following can be used to establish a static VLAN assignment for a device. All WLAN traffic grouped within the same VLAN Assigning a VLAN based on the switch port the device is connected to Authentication processes in cooperation with a RADIUS server Client device information, such as MAC address or location

Assigning a VLAN based on the switch port the device is connected to

What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBASE-T transmissions at 100 meters? Cat 5e Cat 6 Cat 7 Cat 6a

Cat 6a Explanation: While Cat 6 cable can support 10 Gbps speeds at shorter distances, Cat 6a is the first category of cable rated for 10 Gbps at 100 meters.

Name the phenomenon where a wireless signal is split into secondary waves, when it encounters an obstruction? Refraction Reflection Diffraction Scattering

Diffraction Correct. Diffraction takes place when a wireless signal is diffracted, or split into secondary waves, when it encounters an obstruction.

You are working as a network administrator for an ISP. You receive a complaint about fluctuations in the network speed despite using a fiber-optic cable. On checking the situation, you are of the opinion that you will need to cut a clean slice through the fiber strands. Which of the following kits should you carry for this purpose? Cable crimper Fusion splicer Fiber cleaver Fiber stripper

Fiber cleaver Correct. A fiber cleaver cuts a clean slice through the fiber strands.

Which of the following prefixes would you allot for a quantity of 1,000,000,000 bits per second? Kilo Mega Giga Tera

Giga Correct. Giga is the prefix for a quantity of 1,000,000,000 bits per second.

When shopping for a new router, what does the MTBF tell you? How long it will usually take to repair that device How long until that device fails How much it will cost to repair that device How long devices like this one will last on average until the next failure

How long devices like this one will last on average until the next failure Explanation: MTBF (mean time between failures) indicates how long devices like this one will last before the next failure is expected to occur. No one can predict when a specific device will fail. The cost of repairs to a device can only be calculated once the problem is identified. MTTR (mean time to repair) calculates the average amount of time required to repair a device.

What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols? Layer 1 Layer 3 Layer 4 Layer 2

Layer 3 Explanation: WLANs define operations at OSI layers 1 and 2. They support the same TCP/IP protocols—such as IP, TCP, and UDP—from layer 3 and up as wired LANs do.

As a network administrator, you want to modernize your network with modular software running on standard server platforms. You want to start by replacing traditional, custom-designed network equipment. You also wish to have flexible, cost-saving options for many types of network devices, including virtual servers, data storage, load balancers, and firewalls. Which of the following will you use in such a scenario? SDN NFV FCoE vSwitch

NFV

As you're troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone? EIRP RSSI Band Channel

RSSI

Which of the following protocols can detect and correct link failures in milliseconds? CARP RSTP TRILL SPB

RSTP

Which of the following multiplexing types divides a channel into multiple intervals of time, or time slots? STDM WDM FDM TDM

TDM Correct. TDM (time division multiplexing) divides a channel into multiple intervals of time, or time slots.

Which of the following is a multipath link-state protocol? RSTP CARP TRILL SPB

TRILL

Which of the following cables consists of one or more insulated wire pairs encased in a plastic sheath? Coaxial cable UTP cable Twinaxial cable STP cable

UTP cable Correct. UTP (unshielded twisted pair) cabling consists of one or more insulated wire pairs encased in a plastic sheath.

What virtual, logically defined device operates primarily at the data link layer to pass frames between nodes? Virtual firewall Virtual switch Virtual router Virtual load balancer

Virtual switch Explanation: A vSwitch (virtual switch) or bridge is a logically defined device that operates at the data link layer to pass frames between nodes. NFV (Network Functions Virtualization) provides flexible, cost-saving options for many types of network devices, including virtual routers, virtual load balancers, and virtual firewalls.

Which of the following wireless technologies does not use the 2.4 GHz band? Wi-Fi ZigBee Bluetooth Z-Wave

Z-Wave Explanation: Z-Wave functions at the fixed frequency 90.842 MHz. Bluetooth, ZigBee, and Wi-Fi all function in the 2.4-2.4835 GHz band.

When a router connects to a switch that supports multiple VLANs, it is sometimes called _____. a router-on-a-stick trunking a native VLAN ICS

a router-on-a-stick Correct. When one router connects to a switch that supports multiple VLANs, it is sometimes called a router-on-a-stick.

Blue Whale is an e-commerce website that has hired you as part of the network management team. The network administrator has delegated one of his tasks to you, which requires you to allow and configure more than one MAC address in one of the ports. Which of the following commands will help you complete the task at hand? allowed-mac mac-limit port-security switchport port-security

allowed-mac

Subnetting, which alters the rules of classful IPv4 addressing, is known as _____. relay agent IP helper address classless addressing VLSM

classless addressing Correct. Subnetting, which alters the rules of classful IPv4 addressing, is known as classless addressing.

Which of the following network technologies uses a transport layer protocol that runs on top of TCP to allow fast transmissions over LANs, WANs, and the Internet? iSCSI FC IB FCoE

iSCSI

As a network administrator of Wheeling Communications, you have to ensure that the switches used in the organization are secured and there is trusted access to the entire network. In order to maintain this security standard, you have decided to disable all the unused physical and virtual ports on your Huawei switches. Which of the following commands will you use to bring your plan to action? port-security switchport port-security disable shutdown

shutdown

What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130 hosts per subnet? 0 bits 8 bits 9 bits 10 bits

8 bits Explanation: Using the formula 2h - 2 = Z, a value of 8 for the number of host bits yields 256 - 2, or 254, available host addresses. Seven host bits would only allow 126 hosts per subnet. If at least eight bits must be used for host information in a class B network, then up to eight bits can be borrowed for network information.

Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands? 802.11b 802.11ax 802.11g 802.11ac

802.11ax Explanation: Similar to 802.11n, 802.11ax devices operate in both the 2.4 GHz and 5 GHz frequency ranges. 802.11b and 802.11g both operate in the 2.4 GHz band. 802.11ac operates in the 5 GHz band.

Which of the following 802.11 wireless standards has a theoretical throughput of 11 Mbps? 802.11ax 802.11b 802.11a 802.11n

802.11b has a theoretical throughput of 11 Mbps.

What information does the switchport port-security command use to restrict access to a switch's interface? IP address MAC address Port number Broadcast address

MAC address Explanation: The switchport port-security command restricts the number of MAC addresses per port and stores acceptable MAC addresses in a table that can be configured manually or dynamically. Firewalls filter traffic by port number or IP address. A broadcast address is used for managing broadcast traffic on a network.

Which assignment technique requires a RADIUS server? Dynamic VLAN assignment Static IP address assignment Dynamic IP address assignment Static VLAN assignment

Dynamic VLAN assignment Explanation: A dynamic VLAN assignment can be made after successful authentication with a RADIUS server. A static VLAN assignment is made based on the switch port the device is connected to. A dynamic IP address is assigned by a DHCP server. A static IP address is assigned by a network admin.

You have been tasked to set up a 10GBASE-T standard Fast Ethernet for JJ Mills Corporation. While doing so, you have managed to follow all the specified standards, and the only thing left to do is to purchase and plug the twisted-cable pairs. Which of the following pairs of twisted cables will you use in this scenario? Cat 5 Cat 6 Cat 5e Cat 7

Cat 7 Correct. For a 10GBASE-T standard, Cat 7 is generally preferred.

Which one of the following wireless transmission types requires a clear LOS to function? Bluetooth NFC Wi-Fi IR

IR Explanation: Because it's a form of light, IR (infrared) requires a nearly unobstructed LOS (line of sight) between the transmitter and receiver—some devices use a scatter mode that reflects IR signals off nearby surfaces in order to circumvent some obstacles, but IR cannot pass through these obstacles.

You've just completed a survey of the wireless signals traversing the airspace in your company's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. Its SSID is broadcasting the name of a smartphone model. What kind of threat do you need to report to your boss? Hidden node Evil twin War driving Rogue AP

Rogue AP Explanation: A rogue AP offers a connection to the Internet without the authorization of the area's network administrator. An evil twin is a type of rogue access point used to trick a device into connecting to the wrong network by broadcasting the same SSID as the authorized network. War driving is when a hacker searches for unprotected wireless networks by driving around with a laptop or smartphone configured to receive and capture wireless data transmissions. The hidden node problem happens when a wireless node is not visible to other nodes on the other side of the coverage area.

You are a network analyst at a securities firm. You have to assign an identifier to each VLAN used in the network so that the connecting devices can identify which VLAN a transmission belongs to. Which of the following will you use in such a situation? MTU SAID VLAN hopping Stack master

SAID

Which kind of multiplexing assigns slots to nodes according to priority and need? STDM (statistical time division multiplexing) You Answered TDM (time division multiplexing) WDM (wavelength division multiplexing) CWDM (coarse wavelength division multiplexing)

STDM (statistical time division multiplexing)

As a network administrator, you want to validate that a data packet is being fragmented and subdivided into smaller parts to ensure reliable delivery. Which of the following fields in the 802.11 data frame will you check for this information? Trailer Data Sequence Control Frame Control

Sequence Control

You are working as an intern for an Internet service provider. You are asked to assist a senior network engineer on a field day. The network engineer calls you and tells you to carry along a device to measure all the frequencies within a scanned range. Which of the following devices will you carry in this situation? RADIUS Captive portal Spectrum analyzer Wi-Fi analyzer

Spectrum analyzer Correct. A spectrum analyzer can assess the quality of a wireless signal by scanning a band of frequencies for signals and noise.

You are working as one of the network administrators of Wells & Welsh Associates. The company wants to provide network administrators with more centralized control of network settings and management. For this reason, the department has decided to use an SDN (software-defined networking) controller to allow network administrators to remotely manage network devices and monitor data collected about these devices. Which plane of the SDN will enable you to allow such a feature? The application plane The data plane The management plane The control plane

The management plane Correct. While not a typical layer for network communication, this plane could be considered as a part of the control plane. It allows network administrators to remotely manage network devices, monitor those devices, and analyze data collected about the devices.

Globcom is a call center operating in California. It has hired you as a network administrator to set up a voice VLAN to ensure the quality of voice transmissions. Which of the following will not be of immediate priority while setting up the VLAN connection? Minimized latency Untagged frames High bandwidth Flexible routing

Untagged frames

Jamieson has hired you to set up a wireless network for his new workstation that includes a home router as well. The only problem you are facing while setting up the connection is related to channel overlapping, which is causing interference on other routers that are installed on the first floor of his house. Looking at the situation, you have decided to determine the channels used by other nearby networks and then utilize a less crowded channel. Which of the following devices will you use for this installation? Captive portal Spectrum analyzer RADIUS Wi-Fi analyzer

Wi-Fi analyzer Correct. A Wi-Fi analyzer can evaluate Wi-Fi network availability as well as help optimize Wi-Fi signal settings or help identify Wi-Fi security threats. In case of channel overlapping, a Wi-Fi analyzer can be used to determine which channels are being used by nearby wireless networks, and then utilize a less crowded channel.

Wildfilms Ltd., who is your client, has raised a ticket complaining of loss in signal strength since the new upgrade. Earlier, the connection was established using wired transmission, which has now been upgraded to a wireless connection. Which of the following will you use to amplify the power of the transmission in this scenario so that the issue can be resolved? RSSI FHSS Signal propagation Wireless range extender

Wireless range extender Correct. A wireless range extender is similar to a repeater used in wired transmission, which amplifies the power of transmission by repeating a signal from a closer broadcast point. A wireless range extender should sort the issue in this scenario.

What is the maximum supported bandwidth for a Category 5 twisted-pair cable specified under TIA/EIA-568 standards? 1000 Mbps (1 Gbps, Gigabit Ethernet) 10 Gbps 100 Mbps 10 Mbps

100 Mbps (Fast Ethernet)Correct. Cat 5 twisted pair can support a maximum bandwidth of 100 Mbps.

Moses has just been hired as a service manager for Dalton Associates. Which of the following statements misrepresents information that might be essential for Moses to be familiar with? Directional antennas transmit wireless signals along a single direction. The geographical area that an antenna or wireless system can reach is known as its range. TV and radio stations use omnidirectional antennas. A more negative RSSI value indicates a higher quality of signal.

A more negative RSSI value indicates a higher quality of signal. Correct. An RSSI value closer to zero indicates better signal quality.

Scott & Wayne Law Associates is a private law firm in Atlanta specializing in cases involving violation of environmental laws. The firm currently has approximately 50 employees who all work on various matters and in different departments. You have been hired as a network administrator and tasked with finding a suitable cloud model for the firm. The firm is looking for a comparatively low-cost cloud model that can be accessed only by the employees and senior management but not its clients or third parties. Which of the following cloud models would you choose? A hybrid cloud A community cloud A private cloud A public cloud

A private cloud Correct. In a private cloud model, service is established on an organization's own servers in its own data center or established virtually for a single organization's private use and made available to users over a WAN connection through some type of remote access. If hosted internally, this arrangement allows an organization to use existing hardware and connectivity, potentially saving money.

Which of the following transceivers supports up to 10 Gbps? XFP SFP+ QSFP SFP

XFP

Which of the following transceivers supports up to 10 Gbps? SFP XFP QSFP SFP+

XFP Correct. XFP (10 Gigabit small form-factor pluggable) supports up to 10 Gbps.

You are a network engineer who is working on a very busy network and is concerned why the actual throughput is less than the potential bandwidth. The total signal strength has been estimated to be 1000 watts, and the estimated loss of signal due to noise has been calculated to be 6 dB. What is the throughput that is being received at the moment as per your calculations, keeping the 3-dB rule in mind? 500 watts 750 watts 250 watts 125 watts

250 watts Correct. A loss of 3 dB between the transmitter and receiver indicates that the signal has lost half its power. Here, since the loss was 6 dB, it would mean 75 percent loss of the original strength, which adds up to 250 watts.

Bilmain Manufactures has recruited you as a network administrator to handle the organization's network operations. You want to set up a class A IP address. What will be the subnet mask for this class A address? 255.255.255.255 255.0.0.0 255.255.0.0 255.255.255.0

255.0.0.0 Correct. This is the default subnet mask for a class A address.

The organization where you are currently working as a network administrator has a class A network address 10.0.0.0 with 40 subnets. You want to add another 60 new subnets to the network. You would like to still allow for the largest possible number of host IDs per subnet. Which of the following subnet masks will you choose in this scenario? 255.252.0.0 255.254.0.0 255.240.0.0 255.248.0.0

255.254.0.0 Correct. The total number of subnets required is 100; hence, 27 = 128 will give us the maximum number of hosts. Counting the value of bits borrowed will add up to 254, so 255.254.0.0 is the subnet mask that should be chosen in this scenario.

Which formulas can be used to calculate the magic number? Choose two 256 - the interesting octet 2n 2h - 2 2h

2h Explanation: The magic number can be calculated by subtracting the interesting octet value from 256 or by raising 2 to the power of the number of bits in the host portion of the subnet mask's interesting octet (2h).

Ross is running a small data entry back office, for which he has contracted you for network management. Ross has made it very clear that because he has just started the company he wants to cut down on expenses wherever he can. One such option involves the router-he wants to exchange the router with a similar but less expensive alternative. Which of the following will you refer to Ross in such a situation? Storm control A root port A layer 3 switch An SDN controller

A layer 3 switch

Which Carrier Sense technology is used on wireless networks to reduce collisions? EAPoL SSID CSMA/CD CSMA/CA

CSMA/CA Explanation: 802.11 standards specify the use of CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) procedures to access a shared medium. Compared with CSMA/CD (Carrier Sense Multiple Access with Collision Detection), CSMA/CA minimizes the potential for collisions, but it cannot detect the occurrence of a collision and so cannot take steps to recover from the collisions that do occur. EAP (Extensible Authentication Protocol) was adapted to work on both wired and wireless LANs in the 802.1X standard, dubbed EAPoL (EAP over LAN). A wireless network's SSID (service set identifier) is a character string used to identify an access point.

You have been working as a network engineer for Flaming Systems and Solutions. An existing client of your organization has requested you to set up a network for a new joint wherein a user will have to agree to a certain set of terms and conditions before gaining access to the network. Which of the following options will you use in such a scenario? Captive portal Wireless client isolation Geofencing Guest network

Captive portal Correct. When you set up a captive portal, the first page a new client sees in the browser requires the user to agree to a set of terms and conditions before gaining further access to the guest network.

Your network administrator wants you, a network analyst, to partition a VLAN broadcast domain. However, he has asked you to ensure that the host can connect with the Internet. Which of the following will you use in this scenario? Voice VLAN Community VLAN Management VLAN Isolated VLAN

Community VLAN Correct. Hosts within the same community VLAN can communicate with each other but not with hosts in other secondary VLANs.

You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for? Guest network Captive portal Brute force attack Evil twin

Evil twin Explanation: An evil twin is a rogue access point used to trick a device into connecting to the wrong network by broadcasting the same SSID as the authorized network or another SSID that appears just as legitimate to the user. A guest network is an isolated network to give guests access to Internet service without opening the doors to the entire LAN on that router. A captive portal is the first page a new client sees in the browser when connecting to the guest network, and usually requires the user to agree to a set of terms and conditions before gaining further access to the guest network. A brute force attack means trying numerous possible character combinations to find the correct combination for a password or passphrase.

What type of fiber-cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable? Wavelength mismatch Fiber type mismatch TX/RX reverse Dirty connectors

Fiber type mismatch Explanation: Same-mode cables can be mismatched if the cores have different widths; a cable with a 50-micron core should not be connected to a cable with a 62.5-micron core, even though they're both MMF, as this results in a fiber type mismatch. Signal loss and other errors can be caused by dirty connectors. A wavelength mismatch occurs when transmissions are optimized for one type of cable but sent over a different type of cable. A TX/RX (transmission/receive) reverse occurs when the TX and RX wires are crossed in a twisted-pair cable.

Michael Slater is the new technician in the office. An issue has reduced the performance of the network, but he is unable to diagnose the reason behind the issue. On checking the recommended geographic range for the AP, he realizes that the clients are not within the recommended distance. This has caused multiple data errors and a deterioration in communication. Which of the following issues has caused the issue here? Channel overlap Insufficient wireless coverage Interference Simultaneous wired and wireless connections

Insufficient wireless coverage Correct. Insufficient wireless coverage may occur when a client is too far from an AP or if there are too many obstacles between the two nodes. Communication might occur, but data errors become more probable and slow down communication. So, this should be the issue that Michael has encountered.

In the formula 2n = Y, what does n represent? It is the number of bits that must be switched from the host address to the network ID. It equals the number of hosts available in each subnet. It equals the number of bits remaining in the host portion. It is the number of subnets that result.

It is the number of bits that must be switched from the host address to the network ID.

Which device can manage traffic to multiple servers in a cluster so all servers equally share the traffic? Switch Load balancer Router Firewall

Load balancer Explanation: A load balancer helps to evenly distribute traffic to each device in a server cluster so every device carries a portion of the load. A router uses logical addressing information to direct data between two or more networks and can help find the best path for traffic to get from one network to another. A firewall selectively filters or blocks traffic between networks. A switch logically subdivides a network into smaller, individual collision domains.

Which cloud management technique executes a series of tasks in a workflow? Orchestration SLA IaC Automation

Orchestration Explanation: Orchestration allows the automation of many individual tasks to work together in a robust workflow. Automation is a programmed, computer-generated response to a specific event. IaC (infrastructure as code) is the process of using text-based commands in a computer-readable configuration file to create and manage cloud resources. An SLA (service-level agreement) defines service standards, such as availability.

Yours Eventfully is a talent acquisition firm that wants to install biometric methods such as hand scanning at its office for which you have been contracted. Your job as a network engineer is to create an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process. Which of the following versions of EAP will you use in this scenario? PEAP EAP-FAST EAP-TLS EAP-MSCHAPv2

PEAP Correct. PEAP (Protected EAP) creates an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process. So, this should be used in this scenario.

Which of the following features of a network connection between a switch and server is not improved by link aggregation? Fault tolerance Availability Bandwidth Speed

Speed Explanation: Link aggregation isn't about speed of network traffic so much as bandwidth, fault tolerance, and resource availability.

You as a network analyst want to make certain changes to a VLAN database, and you want these changes to be reflected in all the other switches in the network. Which of the following will you use? VLAN hopping SAID Stack master MTU

Stack master Correct. VTP (VLAN Trunk Protocol) allows changes to a VLAN database on one switch, called the stack master, to be communicated to all other switches in the network.

Which of the following will you use to assign a VLAN based on the switch port the device is connected to? SAID Dynamic VLAN assignment Subinterface Static VLAN assignment

Static VLAN assignment Correct. Devices can be assigned to a VLAN based on the switch port the device is connected to. This is called a static VLAN assignment.

Krypton Spares and Parts is an MNC dealing in motorcycle spare parts. The administration department of the company has constantly been complaining of severe network issues, and you have been hired to fix the issues. On inspection, it has come to your notice that these network fluctuations are primarily because of flooding attacks from broadcast and multicast traffic. Which of the following do you plan on using to fix this issue? Storm control A BPDU filter A BPDU guard A root guard

Storm Control Correct. Storm control is a flood guard that protects against flooding attacks from broadcast and multicast traffic. Storm control monitors network traffic at one-second intervals to determine if the traffic levels are within acceptable thresholds. Any time traffic exceeds the predefined threshold, all traffic is dropped for the remainder of the time interval.  

You, as a network engineer, have been sent to insert twisted pairs into an RJ-45 T568B for a newly set up network at Delta Innovations. Which of the following cables will you use in this scenario to connect the workstation to a switch? Rollover cable Fiber-optic cable Crossover cable Straight-through cable

Straight-through cable Correct. The straight-through cables are designed for most connections you will need in a network, such as connecting a workstation to a switch or a switch to a router.

The headquarters of BBK Solutions has detected a possible attack with the help of VLAN tags. Mathews is the head of the Network Administration department in BBK Solutions, and he has to come up with security measures to prevent such instances from occurring in the future. Which of the following security measures should Matthews consider keeping the VLAN pathway as the primary focus? The default VLAN should not be used. The native VLAN should be changed to a used VLAN ID. Auto-trunking on switches that do not need to support traffic from multiple VLANs should be enabled. All VLAN ranges should be accepted on each trunk.

The default VLAN should not be used.

Which of the following is not a good reason to segment a network? To increase the number of networking devices on a network To reduce the demand on bandwidth To narrow down the location of problems on a network To limit access to broadcast domains

To increase the number of networking devices on a network Explanation: Segmenting a network enhances security by limiting access to broadcast domains, improves performance by reducing the demand on network bandwidth, and simplifies troubleshooting by helping network admins to narrow down the possible location of problems on a network. However, increasing the number of networking devices on a network is not a goal of subnetting.

Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair? Toner Tone generator TDR Tone locator

Tone locator Explanation: A tone locator, or probe, emits an audible tone when it detects electrical activity on a wire. A tone generator, or toner, issues a signal on a wire that is then detected by the tone locator. A TDR (time domain reflectometer) issues a signal on a cable and then measures the way the signal bounces back (or reflects) to the TDR.

Mediacom Communications has requested you to manage the access to its 802.11 standard wireless networks. A recent instance of errors in transmission has been recorded, and in order to fix this problem, you want to run a cyclical code to check for errors in transmission. In which field of the 802.11 data frame will you run this check? Sequence Control Data Trailer Frame Control

Trailer Correct. The Trailer field uses a cyclical code to check for errors in the transmission and hence should be used in this scenario.

Which port mode on a switch enables that port to manage traffic for multiple VLANs? Trunk Access Private Community

Trunk Explanation: The trunk port connects a switch to a networking device such as a router or another switch and can manage traffic from multiple VLANs. An access port connects the switch to a host and typically carries traffic for only one VLAN. A private VLAN partitions a VLAN broadcast domain into subdomains. Hosts within the same community VLAN can communicate with each other but not with hosts in other secondary VLANs.

You as a network administrator want to protect the network from unauthorized traffic, and for this reason, you decide to change the native VLAN to an unused VLAN so that the untagged traffic is essentially directed toward a dead-end. Which of the following commands will you use to do this on a Cisco switch? set port-mode trunk ip dhcp snooping set native-vlan-id switchport trunk native vlan

switchport trunk native vlan Correct. The command switchport trunk native vlan can be used to change the native VLAN to an unused VLAN so that the untagged traffic is essentially directed toward a dead-end.

What is the formula for determining the number of possible hosts on a network? 2h - 2 = Z 2n = Y 2h = Z 2n - 2 = Y

2h - 2 = Z Explanation: Raising 2 to the power of the number of host bits yields the number of possible IP addresses in a subnet. However, each subnet needs its own network ID and broadcast address, so you must subtract 2 from this number to determine the number of available host addresses. This gives the formula 2h - 2 = Z. The formula 2n - Y can be used to determine the number of network bits borrowed from host bits or the number of subnets that will result from borrowing a given number of bits.

Gamezee is a YouTuber who streams games. He has recently hired Jasmine to help him manage the wireless video streaming services. Currently, Gamezee is facing a network fluctuation issue. As a result, there are lags in his live video stream. He wants Jasmine to install the latest available Wi-Fi so that the devices can tap and utilize the maximum bandwidth and increase the throughput. Analyze which frequency range will help Jasmine to fix this issue. 300 GHz-300,000 GHz 5.925 GHz-7.125 GHz 2.4 GHz-2.4835 GHz 2.457 GHz

5.925 GHz-7.125 GHz Correct. Wi-Fi 802.11ax, also known as Wi-Fi 6E, operates within this frequency and maximizes the throughput. This will help Jasmine to fix the issue.

Which IEEE standard determines how VLANs work on a network? 802.11 802.3af 802.1X 802.1Q

802.1Q Explanation: Port tagging is specified in the IEEE 802.1Q standard, which defines how VLAN information appears in frames and how switches interpret that information. EAP (Extensible Authentication Protocol) was adapted to work on both wired and wireless LANs in the 802.1X standard, dubbed EAPoL (EAP over LAN). IEEE's 802.11 standards are collectively known as Wi-Fi. IEEE's 802.3af standard specifies a method for supplying electrical power over twisted-pair Ethernet connections, also known as PoE (Power over Ethernet).

Which function of WPA/WPA2 security ensures data cannot be read in transit? Key distribution Message integrity Authentication Encryption

Encryption Explanation: Encryption algorithms can scramble data transmitted over the airwaves into a format that cannot easily be interpreted if the signal is intercepted. Message integrity ensures incoming packets are, in fact, coming from their declared source. Authentication allows a wireless client to log on to the network. Key distribution assigns every transmission its own key.

Mr. Chadwick has recently set up a network connection for a client wherein he made a transition between an SMF and an MMF cable using a fusion splicer. Around a week later, the client calls him up and raises a concern about fluctuations in the network. Mr. Chadwick decides to conduct an on-site inspection, and he gets to know that the reason behind the fluctuation is that the transmission has not traversed successfully. Analyze which common fiber problem Mr. Chadwick is referring to in this case. Link loss Dirty connectors Wavelength mismatch Fiber type mismatch

Fiber type mismatch Correct. A fiber type mismatch is actually a fiber core mismatch wherein connecting an SMF (single mode fiber) cable to an MMF (multimode fiber) cable will prevent the transmission from traversing the connection successfully, though some of the signal can get through.

Which of the following creates and manages a VM (virtual machine) and allocates hardware resources for the host and any of its guest VMs? NFV vSwitch Hypervisor vNIC

Hypervisor Correct. A hypervisor creates and manages a VM, and it allocates hardware resources for the host and any of its guest VMs.

What software allows you to define VMs and manage resource allocation and sharing among VMs on a host computer? NFV (Network Functions Virtualization) Hypervisor SDN (software-defined networking) Terminal emulation

Hypervisor Explanation: A hypervisor creates and manages a VM and allocates hardware resources for the host and any of its guest VMs. NFV (Network Functions Virtualization) is the merging of physical and virtual network architecture. SDN (software-defined networking) is a centralized approach to networking that removes most of the decision-making power from network devices and instead handles that responsibility at a software level. Terminal emulation, also called remote virtual computing, allows a remote client to take over and command a host computer.

You, as a network administrator, have been contracted to set up a WLAN network so that you can transmit data directly to the other nodes without any intervening connectivity device. Which of the following will you use for this purpose? ESS BSS IBSS SSID

IBSS

The University of Pochinki scheduled a webinar for the students belonging to the law department. The webinar had professionals participating from various parts of the state. However, once the webinar started, a lot of participants sent messages claiming that the video transmission was repeatedly jumping around. The university called in its network administrator to take a look at the situation. Analyze what might have been the issue here. Attenuation Jitter Noise RTT

Jitter Correct. If packets experience varying amounts of delay, they can arrive out of order, which is also known as jitter, or more precisely, PDV (packet delay variation). This might cause streaming video or voice transmissions to pause repeatedly, jump around, or stall out completely.

Which hexadecimal block in an IPv6 address is used for the Subnet ID? The fourth one The first one The third one The eighth one

The fourth one Explanation: The first four blocks normally identify the network and serve as the network prefix. The fourth hexadecimal block in the site prefix can be altered to create subnets within a site. The last four blocks identify the host interface.

The Centre for Equity Studies is a not-for-profit organization in Staten Island, New York, working in the human rights sector. Currently, because of the pandemic, the employees work from home. They work in association with three other initiatives, all of them involved in the same sector. Hence, there are a lot of resources that are routinely shared among all of them but not with the general public. You have been assigned the task of selecting one cloud model, keeping in mind the working conditions and the requirements of the users. Which of the following would suit this organization the most? A public cloud A community cloud A private cloud A hybrid cloud

A community cloud Correct. In a community cloud model, service is shared between multiple organizations but is not available publicly. Organizations with common interests, such as regulatory requirements, performance requirements, or data access, might share resources in this way.

Which of these categories of twisted-pair cable can support Gigabit Ethernet? Cat 5e, Cat 6, Cat 3 Cat 5, Cat 6, Cat 7 Cat 6, Cat 7a, Cat 5 Cat 5e, Cat 6a, Cat 7

Cat 5e, Cat 6a, Cat 7 Explanation: Cat 5e is the minimum category of twisted-pair cable that supports Gigabit Ethernet. Cat 6a and Cat 7 also support Gigabit speeds or higher.

Pocso Group of Institutions has hired you to set up a LAN connection so that the students in the hostel can easily avail the prerecorded classes. These classes are provided through video lectures on the desktops situated at the common rooms for each hostel within the campus. Which of the following standards will you apply to provide the fastest transmission for their requirement? 10BASE-T 10GBASE-T 100GBASE-T 100BASE-TX

100GBASE-T

RT&T is a world-renowned ISP that has hired you as a contractor for a cross-country network cabling project for its upcoming new FiberNet package. Through this package, it plans on providing high-speed Internet to consumers. Which of the following cables will you choose to carry out this large-scale project? Twisted-pair cable Coaxial cable MMF SMF

Correct. Laser-generated light travels a single path over the core, reflecting very little. Because it reflects little, the light does not disperse as the signal travels along the fiber. This continuity allows SMF (single mode fiber) to accommodate the highest bandwidths and longest distances (without requiring repeaters) of all wired network transmission media. The Internet backbone depends on single mode fiber.

Mr. Lowe is a network administrator who plans on purchasing a switch that will be the part of a network for a new fast-growing fast-food joint named Momos & More (M&M). The team at M&M has specifically told Mr. Lowe that even though the current need of the network is two fiber-optic connections, it is planning on a significant expansion in the coming years. This expansion will include a fiber-optic connectivity to every desktop in the organization. Analyze what Mr. Lowe should do in this situation. Use APC ferrules Order media convertors Order switches that allow upgradeable interfaces Order a switch with the current demand number

Order switches that allow upgradeable interfaces Correct. Using a fiber transceiver is best in a situation like this because rather than ordering a switch that contains exactly the currently needed number and type of onboard interfaces, Mr. Lowe could order a switch that allows him to change and upgrade its interfaces at any time.

Which cloud service model gives software developers access to multiple platforms for testing code? XaaS PaaS SaaS IaaS

PaaS Explanation: PaaS (Platform as a Service) provides a platform on which to test or run code without having to manage the underlying server. IaaS (Infrastructure as a Service) provides virtual hardware services, including network infrastructure devices such as virtual servers and DNS services. SaaS (Software as a Service) consists of applications provided through an online user interface that are compatible with a variety of devices and operating systems. XaaS (Anything as a Service) emphasizes the ability of the cloud to provide any combination of functions depending on a client's exact needs.

Which cable is best suited for ultra-high-speed connections between a router and a switch on the same rack? Cat 6 twisted-pair cable RG-6 coaxial cable Cat 5e twisted-pair cable Passive twinaxial cable

Passive twinaxial cable Explanation: Twinax an inexpensive option for short, high-speed connections, such as when connecting switches to routers or servers in a data center; passive twinax is sufficient for the shortest distances of less than about 5 or 7 meters. RG-6 coaxial cables is used to deliver broadband cable Internet service and cable TV, particularly in the last stretch to the consumer's location. Cat 5e and Cat 6 twisted-pair cable have more limited available throughput than twinax.


संबंधित स्टडी सेट्स

15-Changing Attitudes and beliefs- How did new ideas about race and the works of Montaigne and Shakespeare reflect the encounter with new peoples and places

View Set

Accessibility and Universal Design

View Set

Ch 12 - Data extraction, transformation, and loading

View Set

Bus 301 Mid Term Practice Exam, Chapter 7, Chapter 5, Chapter 6, Chapter 4

View Set

Lesson 2 - The Roaring Twenties Unit 5 - The Roaring Twenties and the Great Depression

View Set